Endpoint Security

Key risks in endpoint security explained

In the post-pandemic world, decentralized work increases data breach risks. Learn why endpoint security is more crucial than ever.

June 15, 2021

As businesses shift to a decentralized working environment amid the coronavirus pandemic, the risks of network intrusion and data breaches multiply. Endpoint security risks have become a major factor in company security. Here’s why endpoint security matters more than ever in a post-pandemic world.

Types of endpoint security risks

An endpoint is any device that is connected to a computer network. If you have more questions about the basics of endpoints, we have an entire article on that. However, knowing the endpoints is one thing, but plugging the attacks that can emanate from these endpoints is a whole other battle. Some of the most common endpoint security risks include:


A typical phishing email. Such messages can be characterized by a suspicious sender, grammatical errors, and a malicious link.

The most popular and least sophisticated form of attack, phishing, is the use of fake messages to gain access. The message ostensibly comes from a trustworthy entity (such as a bank or known company) to trick users into providing personal information or downloading malware. The information or malware is then used to gain access to the user’s system, and from there gain a foothold into the larger network that the user works for.

Apart from the Marriott data breach, phishing is also responsible for the JPMorgan Chase breach that compromised 76 million households and 7 million businesses, and the 2014 Sony Pictures hack that saw private emails leaked, upcoming movies released to torrent sites, and cost the company over $100 million.

Device Loss

According to TrendMicro, over 40% of data breach incidents between 2005 and 2015 were caused by lost or stolen endpoint devices like laptops, tablets, and smartphones.

In 2012, a physician’s stolen laptop contained the personal information of over 3,600 patients. The Massachusetts Eye and Ear Infirmary where the doctor was affiliated ended up paying a $1.5 million fine for violating the HIPAA privacy rule.

Prey’s device tracking tool is a great safeguard for device loss threats. You can track device location, and quickly react to unauthorized movements with geofencing. Companies that are nervous about possible endpoint vulnerabilities can have some peace of mind that their employee devices (and company data) are safe.

Outdated Patches

One of the pains of modern life, constant patches are a slight inconvenience but a necessary evil to keep up with evolving threats online. And yet many companies (even those on the Forbes 500) still neglect to hit the update button.

The most famous example is Equifax’s data breach in 2017. The credit reporting agency failed to patch a glaring vulnerability in one of its servers, which allowed hackers to steal the personal data of 148 million US consumers. The ensuing debacle ended in a $650 million FTC fine and a $77.5 million class-action settlement.

Malware Ads

Also known as malvertising, this scam uses legitimate-looking advertisements, and can propagate across reputable websites and social media before being taken down.

In recent years, sophisticated malware have appeared that don’t require any user interaction at all. Such “pre-click” malware can be embedded in the main scripts of webpages, enabling them to run automatically even without being clicked by the user. Host victims include popular sites like The New York Times, the London Stock Exchange, and Spotify.

Drive-by Download

Similar to phishing, this method uses deception to trick users into clicking a link or downloading malware. Examples include fake system alerts, anti-virus notifications, or deceptive installation agreements different from the program the user intended to download.

Drive-by payloads can include Trojan backdoors like the RAT, keyloggers that record keystrokes, and ransomware like the 2016 Locky ransomware attack that took advantage of an auto-run vulnerability in Adobe Flash.

Data Loss and Theft

These are not methods of entry but post-exploit effects of an endpoint security breach.

Data loss refers to data being irretrievably deleted. For an individual, this endpoint security risk can be devastating – years’ worth of personal photos, portfolio or correspondence. For organization, this can be fatal: according to a University of Texas study, 94% of businesses that experience extensive data loss go belly up – 43% shut down immediately, while 51% close up within two years.

Data theft is even more insidious. This means that priceless corporate data, from customer databases to years of R&D, can end up on the dark web or in the hands of competitors.

In 2014, Yahoo suffered a data breach that exposed 1 billion user accounts, the largest of its kind. About 200 million ended up for sale on the dark web, including unencrypted security questions and answers. The incident resulted in a Senate investigation, a $35 million SEC fine, a $117.5 million class-action settlement, and knocked $350 million off Yahoo’s valuation during its acquisition by Verizon.


According to a Malwarebytes study, the US accounts for more than half of all ransomware attacks worldwide, with Texas and California taking the brunt of the attacks.

No other endpoint cyber security risk is as straightforward an extortion as ransomware. This type of malware encrypts all of the users’ files, making them inaccessible unless a ransom is paid.

In most cases, the app is disguised as a legitimate program that tricks users into running it — however newer versions have appeared that require no user interaction, and can travel automatically between computers in a network.

The infamous WannaCry attack in 2017 spread to 150 countries and included victims like Boeing, Deutsche Bahn, FedEx, Hitachi, Honda, Nissan, O2, Renault, Taiwan’s TSMC and Vivo. It also affected government organizations in Brazil, China, India, Russia, the UK, and the US, and was able to extort over $130,000 in bitcoin payments before it was stopped.

The worst thing about ransomware is its indiscriminate effect. Unlike most attacks that deliberately target large enterprises in the hope of monetary gain, ransomware spreads like a virus and can affect virtually anyone, from small mom-and-pop stores and startups to MNCs. Schools, hospitals, and even sheriff’s offices are just some of the victims that shelled out a bitcoin ransom to unblock their data.


A Distributed Denial of Service attack uses a flood of incoming traffic to overwhelm a website, server or network. It uses compromised devices to repeatedly access the target site and eventually disrupt its bandwidth, resulting in a denial of service to normal traffic.According to one research, DDoS attacks soared by 87% year-on-year in 2019, with 16 attempts being made every minute. Of all the attacks made last year, two-thirds were aimed at customer-facing enterprise systems.

Advanced Persistent Threats

APTs refer to groups that gain access to a network and remain undetected for a long period. As the name implies, they are distinct from typical hacker groups in three ways:

Advanced – They have access to a wide range of both commercial and non-commercial intrusion technologies, including advanced hardware and software available only to nation-state actors

Persistent – Rather than being short-term opportunists, APTs are content to lie dormant in compromised networks for months or years, similar to “sleeper cells”

Organized – Compared to informal groups, APTs are highly organized, disciplined and coordinated in their intrusion and execution

In the Marriott breach, US government sources suspect that APTs affiliated with Chinese state agencies were behind the attack. Among the circumstantial pieces of evidence are 1) the code and methodology employed are similar to those use by state-sponsored Chinese hackers, 2) none of the compromised data was leaked or sold to the dark web, in contrast to amateur groups looking for financial gain, and 3) Marriott happens to be the top hotel provider for the US government.

Likewise, China was also implicated in the Equifax breach. Three years after the incident, a Justice Department investigation indicted four members of China’s military for the attack that compromised the personal information of 148 million US citizens.

In both cases, the APT actors lived up to the word “persistent”; the Marriott intruders lay undetected in Starwood’s network for four years, even before it was bought by Marriott. In Equifax, the intruders gained access in March, but only began acting in July after weeks of virtual reconnaissance and subtle queries to get a feel for the system. Both incidents also displayed organization: the stolen data was first compressed and broken into chunks, stealthily exfiltrated as part of background traffic, then deleted in an attempt to cover their tracks.

Unfortunately, the fact that state-sponsored actors may be behind the breach are of little consolation to the victims. Marriott still faces up to $123 million in GDPR fines, while Equifax had to shell out $700 million in penalties and consumer settlement.

Botnet Attacks

Much like a zombie outbreak, a botnet attack turns the infected device into a slave without the owner even being aware of it.

A botnet is any device that has been compromised and can be controlled by unauthorized people. They can be used to send spam, infect other devices, or carry out DDoS attacks as part of a botnet campaign. In effect, the device has become part of a “zombie army” without the owner being aware of it.

In the past botnets were limited to PCs. Today, thanks to the prevalence of IoT (Internet of Things), a wider range of wireless devices are vulnerable to botnet infection. These range from Android smartphones and tablets to smart TVs, CCTV cameras and even smart home appliances like Alexa-enabled lights and microwave ovens.

This endpoint security risk is a double pain because once infected, a portion of the device’s processing power, energy and bandwidth goes to botnet attacks whenever it gets activated to take part in a botnet campaign.

Macro and Script Attacks

A macro attack uses a virus written in macro language, the kind used by word processors and spreadsheet apps. Hence, it’s most commonly disguised as a Word or Excel document. What makes this endpoint security risk doubly insidious is its form; while most users would be cautious opening a .exe file, a .doc or .xls attachment is less likely to arouse suspicion, particularly if it looks like an office document or sales invoice.

On the other hand, a script attack comes from infected sites or browser-based apps. When a user views such a site or app, it executes a malicious command in the browser without the user’s knowledge.

Both attacks are primarily used as vectors to gain access to the device. For example, the macro attack might be used to download malware automatically, while the script attack may be used to control the device’s webcam, microphone, or steal session cookies (credentials that will allow them to spoof the user on other sites).

Endpoint security challenges

Amid the many ways endpoint security can be breached, there are four main factors that limit an organization’s ability to effectively address these risks.

Risk # 1: Human Behavior

The first is human behavior. Majority of the attack methods depend on human users unwittingly giving access to external actors, whether from falling prey to a phishing scam to neglecting a critical patch or downloading a malware app or macro attachment. Case in point: just a couple of weeks ago, Marriott disclosed yet another data breach affecting 5 million guests, after two employees were phished.

Risk #2: Disjointed Security Solutions

Second is disjointed security solutions. While a workstation and office server may have all the necessary security software, most mobile endpoints like smartphones and personal laptops may not have the same safeguards. A survey of 588 IT security professionals employed in Global 200 companies found that 67% experienced a data breach in their organization caused by mobile endpoint devices.

Risk #3: Limited Resources

Third is limited resources. Even if an organization identifies gaps in endpoint cyber security, it may not have the necessary resources to plug all the holes. For example, not all enterprise security platforms cover devices like Android smartphones and tablets, leaving a chink in its network armor.

The last one concerns evolving endpoint security threats. Each day brings a new virus, malicious code, SQL injection, or piece of malware on the web. Even old vulnerabilities like the ‘90s era macro virus can get recycled and updated for the new generation of Office 365. Meanwhile, it takes companies over six months on average to even become aware of a data breach (in Marriott’s case, it took 4 years!)

How to protect your organization

Get Informed

The first step to safeguarding your information is to get informed. Just by reading this article you’re already halfway there. The other half is getting information about your business endpoints. More specifically, endpoints at the organization-, people-, and device-level.

  • Organization – What type of IT setup do you have (Own server, co-located data center, etc)?
  • People – What kind of setup did they have before the pandemic (Office, remote, field, co-working space)?
  • Tools – What types of business software is used for communication, project monitoring / collaboration, accounting, etc? Consider adding an IT Asset Inventory tool to your repertoire to provide essential insight into your full IT stack.

Get Organized

Once you have the necessary information, it’s time to do something about it and get organized.

  • Organization-level: What are the endpoint security risks that need to be addressed on the network side?
  • People-level: Group people according to working environment (office vs home / remote), device source and type (personal vs. company provided, PC vs mobile), and even OS (Windows, Mac, iOS, etc.)
  • Tools: List down the apps and business programs most commonly used by everyone, including specialized apps used by specific departments (ex. Adobe for the creative team)
  • Create necessary security policies:
  • BYOD
  • Data Security
  • Remote Security
  • Device Loan

Get Help

Finally, with all endpoints identified and organized, get help.

  • Organization – What network security platform best fits your specific IT setup? What hardware / software / updates may have been overlooked?
  • People – Assuming that the office-based and company device-provided group have the requisite security software, focus on the remote group using their own mobile devices and personal PCs. What security solution best fits the myriad gadgets and OS platforms?
  • Tools – Does your current enterprise software cover all your business apps? If not, which ones are vulnerable to intrusion and require additional protection or replacement?

Unified endpoint security software

If you followed the key steps above, one of the glaring challenges will likely be the diverse endpoint devices employed by your team. A security suite for Windows or Mac will be useless for team members who use iOS or Android.

This is where unified endpoint security comes in.

An excellent example of a multi-device, multi-OS endpoint security solution is Prey. Our software combines four critical security components in one convenient app.

What to look for in endpoint security software

Device security – Lost or stolen devices can be remotely screen locked, sound an alarm, and send a message alert. Front and back cameras, along with nearby WiFi networks can also be remotely accessed to identify the device’s location.

Data protection – Prey enables partial or full memory wipe of computers, Apple and Android devices. It also supports file retrieval of lost devices via the cloud.

Tracking and location – Devices can be tracked live, on-demand or on a set schedule, using a wide variety of tracking technologies (GPS & WiFi triangulation). In addition, boundaries can be assigned to each device, along with automated actions should the device leave the boundary. For multinational teams, the tracking options of each device are customizable to comply with local privacy laws.

Streamlined device management – All enrolled devices can be controlled and managed under a single easy-to-use program.

Prey’s unified interface makes it easier to manage multiple devices, along with their status, location, patch version, and alerts at a glance.

Prey addresses each of the endpoint security challenges posed earlier. It mitigates the weaknesses in human behavior by ensuring that each device is electronically protected, and safeguarded from loss or theft. In the event of a lost device, the data can be remotely retrieved and the source remotely wiped.

It also addresses the problems of disjointed solutions and limited resources by combining everything in one convenient, multi-device program.


The current coronavirus epidemic, a changing workplace environment, and evolving data security threats mean that endpoint security risks are higher than ever before.

As more people work outside the traditional office, businesses will have to meet the challenge of protecting their data pipeline from external actors, whether it’s ransomware, a new macro virus, or shadowy state-sponsored hackers. Like a goalie in a soccer game, all it takes is one threat that slips through the net to undermine the whole play. In this high-stakes game, it pays to be informed, organized, and protected before the shot.

Your organization deserves no less.

On the same issue

The critical role of cybersecurity in k-12 education

Explore the challenges faced by cybersecurity for K12 schools as they grapple with increasingly common attacks and their profound impact on students and staff.

October 2, 2023
keep reading
Tips for enhancing security on your phone

Learn everything you need to know about phone security with this complete guide. Mitigate risks that mobiles carry as attackers turn to target them.

September 19, 2023
keep reading
Device Theft in Schools? How Prey Can Help

Discover how Prey can revolutionize school device security, from real-time tracking to remote lockdown, ensuring a safer learning environment

September 6, 2023
keep reading
The Security Challenges of K-12 IT Directors

To spread digital awareness in education, we've created our first Poster Kit. It's essential for students to learn to identify threats and protect their identities online.

July 17, 2023
keep reading